Page MenuHome GnuPG
Feed Advanced Search

Mar 20 2020

werner closed T4850: GnuPG fails to find default key to sign when using a smart card, but recovers once card is removed as Resolved.
Mar 20 2020, 5:59 PM · Restricted Project, gnupg (gpg22)
werner set External Link to https://lists.gnupg.org/pipermail/gnupg-announce/2020q1/000444.html on T4860: Release GnuPG 2.2.20 .
Mar 20 2020, 5:57 PM · gnupg (gpg22), Release Info

Mar 19 2020

dkg added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

I'm aware of the metadata leakage risks of OCSP, and i share your concerns about them.

Mar 19 2020, 10:14 PM · Not A Bug, gnupg (gpg22), S/MIME
werner added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

OCSP can't be the default because it enables a web bug. The responder immediately sees when a signature is verified or a data is encrypted to a certificate.

Mar 19 2020, 7:00 PM · Not A Bug, gnupg (gpg22), S/MIME
dkg added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

If CRLs or OCSP are a MUST in a given profile, and the cert chain has OCSP but no CRL, it seems like that profile should then try OCSP, rather than failing.

Mar 19 2020, 6:53 PM · Not A Bug, gnupg (gpg22), S/MIME
dkg added a comment to T4882: gpgconf --homedir is ignored when setting options.

Thanks for the quick fix, @werner!

Mar 19 2020, 5:18 PM · gnupg (gpg22), Bug Report
werner edited projects for T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs., added: Not A Bug; removed Bug Report.
Mar 19 2020, 1:07 PM · Not A Bug, gnupg (gpg22), S/MIME
werner closed T4882: gpgconf --homedir is ignored when setting options as Resolved.

Fixed.

Mar 19 2020, 1:02 PM · gnupg (gpg22), Bug Report
mrdave19 added a comment to T4573: Files encrypted on another platform using password based encryption (-c) intermittently fail to decrypt on Kleopatra.

Hello,
Sorry for the late reply but with your help we found a bug in our code and it has been fixed. Thanks for your assistance!

Mar 19 2020, 12:28 PM · gnupg (gpg22), Bug Report
werner claimed T4882: gpgconf --homedir is ignored when setting options.

Arggh, this code is a whole mess (e.g. it uses its own logging code). I spent the last week to rework large parts of it for master. I am going to look into this case now.

Mar 19 2020, 12:00 PM · gnupg (gpg22), Bug Report
werner added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

If you want OCSP you need to enable it. CRLs or OCSP are a MUST under the profile we developed gpgsm. This is why --disable-crl-checks by default is not possible. There are lot of interesting things you will come across if you start to use S/MIME. For example you also need to care about the algorithms used for intermediate certificates used to sign CRLs - they need to comply to the policy as well. Or the rarely used PSS padding we encounter sometimes and which is not supported and will probably not be supported

Mar 19 2020, 11:56 AM · Not A Bug, gnupg (gpg22), S/MIME
werner closed T4573: Files encrypted on another platform using password based encryption (-c) intermittently fail to decrypt on Kleopatra as Resolved.

Okay. Thanks.

Mar 19 2020, 11:51 AM · gnupg (gpg22), Bug Report
gniibe added a comment to T4573: Files encrypted on another platform using password based encryption (-c) intermittently fail to decrypt on Kleopatra.

You forwarded me an email, which said it went well.

Mar 19 2020, 9:37 AM · gnupg (gpg22), Bug Report
dkg created T4882: gpgconf --homedir is ignored when setting options.
Mar 19 2020, 1:35 AM · gnupg (gpg22), Bug Report

Mar 18 2020

dkg added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

I thought i'd try with other certificates. I started with the one from this website. It also fails to validate unless i supply --disable-crl-checks, apparently because the immediate issuer (the Let's Encrypt CA) doesn't offer CRLs, only OCSP responders. Perhaps --disable-crl-checks should be the default, or at least if there is no CRL available there shouldn't be a failure by default:

Mar 18 2020, 10:38 PM · Not A Bug, gnupg (gpg22), S/MIME
dkg added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

Aha, i can get it to say f if i use --disable-crl-checks:

Mar 18 2020, 10:30 PM · Not A Bug, gnupg (gpg22), S/MIME
dkg added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

i didn't know that, thanks. i'm now seeing i (which i think means "invalid") in the same configuration:

Mar 18 2020, 9:36 PM · Not A Bug, gnupg (gpg22), S/MIME
werner added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

Add --with-validation to check the validity of a certificate in a listing.

Mar 18 2020, 9:07 PM · Not A Bug, gnupg (gpg22), S/MIME
dkg created T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..
Mar 18 2020, 8:55 PM · Not A Bug, gnupg (gpg22), S/MIME
werner moved T4810: A key with only "C" capability cannot be selected as default key. from Backlog to For next release on the gnupg (gpg22) board.
Mar 18 2020, 4:08 PM · Restricted Project, gnupg (gpg22)
werner moved T4832: card: when KDF is enabled, use of pinpad input should be disabled from Backlog to For next release on the gnupg (gpg22) board.
Mar 18 2020, 4:06 PM · Restricted Project, gnupg (gpg22), scd, Bug Report
werner added a comment to T4832: card: when KDF is enabled, use of pinpad input should be disabled.

Backported to 2.2

Mar 18 2020, 4:06 PM · Restricted Project, gnupg (gpg22), scd, Bug Report
werner moved T4847: "gpgsm: invalid radix64 character 2d skipped" when trying to import a PEM file with DOS line endings (CR+LF) from Backlog to For next release on the gnupg (gpg22) board.
Mar 18 2020, 3:50 PM · gnupg (gpg22), S/MIME, Bug Report
werner moved T4850: GnuPG fails to find default key to sign when using a smart card, but recovers once card is removed from Backlog to For next release on the gnupg (gpg22) board.
Mar 18 2020, 3:50 PM · Restricted Project, gnupg (gpg22)
werner moved T4536: dirmngr fails to find OCSP signer certificate when responder is identified with key ID from Backlog to For next release on the gnupg (gpg22) board.
Mar 18 2020, 3:49 PM · S/MIME, gnupg (gpg22), Bug Report
werner moved T4831: gnupg-2.2.19 fails to build on latest Fedora Rawhide from Backlog to For next release on the gnupg (gpg22) board.
Mar 18 2020, 3:49 PM · gnupg (gpg22), toolchain, Bug Report
werner moved T4860: Release GnuPG 2.2.20 from Backlog to For next release on the gnupg (gpg22) board.
Mar 18 2020, 3:48 PM · gnupg (gpg22), Release Info
werner claimed T4667: "gpg: deleting secret key failed: No pinentry" when in --batch mode with --pinentry=loopback.
Mar 18 2020, 3:02 PM · gnupg24, gnupg (gpg23), Bug Report
werner added a comment to T4667: "gpg: deleting secret key failed: No pinentry" when in --batch mode with --pinentry=loopback.

This is closely related to T3465 which was fixed in master. Running a gpg-agent 2.3 agent and using gpg 2.2 it works; however, using a gpg 2.3 bails out with an error message that we are in batch mode. I will look at this.

Mar 18 2020, 3:02 PM · gnupg24, gnupg (gpg23), Bug Report
werner added a comment to T4573: Files encrypted on another platform using password based encryption (-c) intermittently fail to decrypt on Kleopatra.

@gniibe: I am not sure we really continued by mail - do you have any updates on the status?

Mar 18 2020, 2:19 PM · gnupg (gpg22), Bug Report
werner changed the status of T4536: dirmngr fails to find OCSP signer certificate when responder is identified with key ID from Open to Testing.

Sorry, I have not yet followed you test plan but given that we have the patch in master for a long time now I think it is okay to port it to 2.2.

Mar 18 2020, 2:15 PM · S/MIME, gnupg (gpg22), Bug Report
werner closed T4855: The trusted-key option requires a long key ID and won't take a fingerprint as Resolved.

Thanks. I applied your patch to 2.2 and master. I had to do a minor fix because the function does not return anything. Also extended on master with another patch for v5 keys.

Mar 18 2020, 2:04 PM · gnupg (gpg22), Feature Request
werner added a comment to T4867: with non-existent homedir, `gpgconf --check-programs` produces surprising output..

The newlines are not percent escaped because that could lead to very long lines and thus break parsers. Another reason is that the error messages are easier to read this way. An empty first field is anyway not valid and parsers should skip that.

Mar 18 2020, 1:42 PM · gnupg (gpg22), Bug Report
werner added a comment to T4825: gpg --weak-digest SHA1 incurs a serious performance cost for `--check-trustdb`.

I tried to replicate that with my ~3000 keys on master and I don't see any difference. Did you tried it several times? It might be due to the signature verification cache.

Mar 18 2020, 1:33 PM · gnupg (gpg22), Bug Report
werner closed T4670: Key expiration time ignored for zero creation date keys as Resolved.
Mar 18 2020, 12:45 PM · patch, gnupg (gpg22), Bug Report
werner added a comment to T4670: Key expiration time ignored for zero creation date keys.

I checked the code and your patch looks right. I am going to apply it.

Mar 18 2020, 12:18 PM · patch, gnupg (gpg22), Bug Report
werner closed T4811: --locate-key should try to fetch a key if the local copy is expired. as Invalid.

I am not able to replicate my own bug. At least since the introduction of --locate-external-keys the code paths are identical. I am nut sure why I filed this bug.

Mar 18 2020, 11:41 AM · Bug Report, gnupg (gpg22)

Mar 16 2020

werner lowered the priority of T4879: GnuPG treats reordered OpenPGP certificates differently from High to Low.

It is easy to explain:

Mar 16 2020, 1:04 PM · gnupg24, gnupg (gpg23), OpenPGP, Bug Report

Mar 13 2020

werner claimed T4879: GnuPG treats reordered OpenPGP certificates differently.
Mar 13 2020, 5:33 PM · gnupg24, gnupg (gpg23), OpenPGP, Bug Report

Mar 12 2020

dkg updated the task description for T4879: GnuPG treats reordered OpenPGP certificates differently.
Mar 12 2020, 8:29 PM · gnupg24, gnupg (gpg23), OpenPGP, Bug Report
dkg created T4879: GnuPG treats reordered OpenPGP certificates differently.
Mar 12 2020, 8:01 PM · gnupg24, gnupg (gpg23), OpenPGP, Bug Report
gniibe changed the status of T4810: A key with only "C" capability cannot be selected as default key. from Open to Testing.
Mar 12 2020, 6:43 AM · Restricted Project, gnupg (gpg22)

Mar 9 2020

dkg added a comment to T4867: with non-existent homedir, `gpgconf --check-programs` produces surprising output..

Yes, i'd surmised that the ::::: lines are continuation lines of the error message. but why not just percent-escape the newline in the error message too? Where in the documentation of this API does it say to expect continuation lines of error messages? Is gpgconf expected to be used programmatically?

Mar 9 2020, 6:21 PM · gnupg (gpg22), Bug Report
werner added a comment to T4867: with non-existent homedir, `gpgconf --check-programs` produces surprising output..

Well, I misread the output. What you see is what is expected. From the gpgconf man page:

Mar 9 2020, 12:57 PM · gnupg (gpg22), Bug Report

Mar 6 2020

dkg added a comment to T4867: with non-existent homedir, `gpgconf --check-programs` produces surprising output..

I think you mean "mix", not "fix". right?

Mar 6 2020, 7:06 PM · gnupg (gpg22), Bug Report
werner added a comment to T4867: with non-existent homedir, `gpgconf --check-programs` produces surprising output..

You should not fix stdout with stderr. Granted we could fflush stdout after a line, but rsh is dead and so all software can distinguish between them.

Mar 6 2020, 9:03 AM · gnupg (gpg22), Bug Report
dkg updated the task description for T4867: with non-existent homedir, `gpgconf --check-programs` produces surprising output..
Mar 6 2020, 12:25 AM · gnupg (gpg22), Bug Report

Mar 5 2020

dkg created T4867: with non-existent homedir, `gpgconf --check-programs` produces surprising output..
Mar 5 2020, 11:01 PM · gnupg (gpg22), Bug Report

Feb 28 2020

gniibe added a project to T4832: card: when KDF is enabled, use of pinpad input should be disabled: Restricted Project.
Feb 28 2020, 8:39 AM · Restricted Project, gnupg (gpg22), scd, Bug Report

Feb 27 2020

werner triaged T4855: The trusted-key option requires a long key ID and won't take a fingerprint as Normal priority.

Internally only the long key id is is used thus the fingerprint might give a wrong impression. OTOH, to allow easy migration to future versions, extracting the keyid from the fingerprint is a good idea.

Feb 27 2020, 10:14 AM · gnupg (gpg22), Feature Request
werner created T4860: Release GnuPG 2.2.20 .
Feb 27 2020, 10:10 AM · gnupg (gpg22), Release Info

Feb 19 2020

sanmai added a comment to T4850: GnuPG fails to find default key to sign when using a smart card, but recovers once card is removed.

I can confirm that the problem is gone from a build from the master branch. It indeed retries the search.

Feb 19 2020, 6:44 AM · Restricted Project, gnupg (gpg22)
gniibe changed the status of T4850: GnuPG fails to find default key to sign when using a smart card, but recovers once card is removed from Open to Testing.
Feb 19 2020, 3:07 AM · Restricted Project, gnupg (gpg22)

Feb 17 2020

gniibe changed the status of T4832: card: when KDF is enabled, use of pinpad input should be disabled from Open to Testing.

Fixed in master.

Feb 17 2020, 9:48 AM · Restricted Project, gnupg (gpg22), scd, Bug Report

Feb 15 2020

werner changed the status of T4847: "gpgsm: invalid radix64 character 2d skipped" when trying to import a PEM file with DOS line endings (CR+LF) from Open to Testing.

Fixed in master and 2.2

Feb 15 2020, 7:25 PM · gnupg (gpg22), S/MIME, Bug Report
werner claimed T4847: "gpgsm: invalid radix64 character 2d skipped" when trying to import a PEM file with DOS line endings (CR+LF).
Feb 15 2020, 7:08 PM · gnupg (gpg22), S/MIME, Bug Report
werner edited projects for T4847: "gpgsm: invalid radix64 character 2d skipped" when trying to import a PEM file with DOS line endings (CR+LF), added: gnupg (gpg22); removed gnupg.

Really interesting: The code didn't changed since since 2003 and the bug must have been there all the time. It does happen only for 25% of the certificates with CR and LF; the others have padding characters at the end '=' which is also an indication of the end of the base64 block. I wonder why this has not been reported more often; maybe because most people import binary certificates.

Feb 15 2020, 7:01 PM · gnupg (gpg22), S/MIME, Bug Report

Feb 10 2020

werner changed the status of T4831: gnupg-2.2.19 fails to build on latest Fedora Rawhide from Open to Testing.

Building with -fno-common now works for me on 2.2 and master. Thanks for the patch.

Feb 10 2020, 4:52 PM · gnupg (gpg22), toolchain, Bug Report

Jan 31 2020

werner edited projects for T4832: card: when KDF is enabled, use of pinpad input should be disabled, added: gnupg (gpg22); removed gnupg.
Jan 31 2020, 11:30 AM · Restricted Project, gnupg (gpg22), scd, Bug Report

Jan 30 2020

werner added a comment to T4826: Expiration dates after 2107 are reported as wraparound expiration dates.

We briefly talked in the OpenPGP WG about the u32 problem and agreed that this is not an issue for 2440bis. The mismatch between creation date and expiration period is one of those minor PGP flaws. PGP-2 even used days to specify the expiration period.

Jan 30 2020, 8:26 AM · gnupg (gpg22), Bug Report

Jan 29 2020

dkg added a comment to T4826: Expiration dates after 2107 are reported as wraparound expiration dates.

This is not a problem for 2107 (when you and i are 6 feet under). it's a problem well before then for anything that has an expiration date of 2107 or later (as demonstrated by the legitimate example certificate here today).

Jan 29 2020, 3:44 PM · gnupg (gpg22), Bug Report
werner closed T4826: Expiration dates after 2107 are reported as wraparound expiration dates as Wontfix.

I don't care; encryption won't work for us 6ft under. (This is a protocol problem which someone should address in a couple of decades)

Jan 29 2020, 10:34 AM · gnupg (gpg22), Bug Report
dkg added a comment to T4826: Expiration dates after 2107 are reported as wraparound expiration dates.

This is a problem for gpgv and gpg as well. gpg reports:

Jan 29 2020, 1:02 AM · gnupg (gpg22), Bug Report
dkg created T4826: Expiration dates after 2107 are reported as wraparound expiration dates.
Jan 29 2020, 1:00 AM · gnupg (gpg22), Bug Report

Jan 28 2020

werner triaged T4825: gpg --weak-digest SHA1 incurs a serious performance cost for `--check-trustdb` as Normal priority.
Jan 28 2020, 3:17 PM · gnupg (gpg22), Bug Report

Jan 27 2020

dkg created T4825: gpg --weak-digest SHA1 incurs a serious performance cost for `--check-trustdb`.
Jan 27 2020, 8:58 PM · gnupg (gpg22), Bug Report

Jan 16 2020

gniibe added a comment to T4810: A key with only "C" capability cannot be selected as default key..

Fixed and backported.

Jan 16 2020, 5:04 AM · Restricted Project, gnupg (gpg22)

Jan 15 2020

werner added a comment to T4810: A key with only "C" capability cannot be selected as default key..

I agree.

Jan 15 2020, 9:29 AM · Restricted Project, gnupg (gpg22)
werner created T4811: --locate-key should try to fetch a key if the local copy is expired..
Jan 15 2020, 9:25 AM · Bug Report, gnupg (gpg22)
gniibe added a comment to T4810: A key with only "C" capability cannot be selected as default key..

Err.. Just removing the check may be the correct fix; It doesn't make sense to limit capability here.

Jan 15 2020, 7:41 AM · Restricted Project, gnupg (gpg22)

Jan 14 2020

ringelkrat added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).

Thank you for resolving this issue! I am successfully using version 2.2.19 from the gnupg (2.2.19-1~bpo10+1) package of Debian Backports.

Jan 14 2020, 11:47 AM · gnupg (gpg22), wkd, Bug Report
gniibe added a comment to T4810: A key with only "C" capability cannot be selected as default key..

I think rGe573e6188dad: gpg: Fix --default-key checks. should be fixed as:

diff --git a/g10/getkey.c b/g10/getkey.c
index ad5dd8e01..cc908964e 100644
--- a/g10/getkey.c
+++ b/g10/getkey.c
@@ -1860,7 +1860,8 @@ parse_def_secret_key (ctrl_t ctrl)
           PKT_public_key *pk = node->pkt->pkt.public_key;
Jan 14 2020, 8:28 AM · Restricted Project, gnupg (gpg22)
gniibe added a comment to T4810: A key with only "C" capability cannot be selected as default key..
$ export GNUPGHOME=<somewhere>
# Create a key with "C"-only capability
$ gpg --quick-gen-key "test-user <chuji@gniibe.org>" ed25519 cert
# Create another key (or get/import it)
$ gpg --quick-gen-key "2020-user <chuji2020@gniibe.org>" ed25519
# Sign with the first key to the second key with --default-key
$ gpg --default-key 7694AB44DED1154CEB981059B0B36418AF85C918 --lsign 72FF31542DB059A507BAF81BE05523DEB4B018E6

(where 7694AB...85C918 is the first key and 72FF31..B018E6 is the second key)

Jan 14 2020, 8:03 AM · Restricted Project, gnupg (gpg22)
gniibe added a comment to T4810: A key with only "C" capability cannot be selected as default key..

rGe573e6188dad: gpg: Fix --default-key checks. is suspicious.

Jan 14 2020, 7:39 AM · Restricted Project, gnupg (gpg22)
gniibe created T4810: A key with only "C" capability cannot be selected as default key..
Jan 14 2020, 7:38 AM · Restricted Project, gnupg (gpg22)

Dec 7 2019

werner updated the task description for T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.
Dec 7 2019, 4:28 PM · gnupg (gpg22), S/MIME, Bug Report
werner changed the visibility for T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.
Dec 7 2019, 4:28 PM · gnupg (gpg22), S/MIME, Bug Report
werner updated the task description for T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.
Dec 7 2019, 4:26 PM · gnupg (gpg22), S/MIME, Bug Report
werner closed T4696: Fresh certificate get's pulled into certificate chain with expired root certificate as Resolved.
Dec 7 2019, 1:15 PM · gnupg (gpg22), S/MIME, Bug Report

Dec 6 2019

werner closed T4684: Release GnuPG 2.2.18 as Resolved.
Dec 6 2019, 8:31 PM · Release Info, gnupg (gpg22)
werner moved T4696: Fresh certificate get's pulled into certificate chain with expired root certificate from For next release to Ready for release on the gnupg (gpg22) board.
Dec 6 2019, 8:30 PM · gnupg (gpg22), S/MIME, Bug Report
werner added a comment to T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.

I found a solution for master and 2.1.19 which minimizes the risk of regressions:

Dec 6 2019, 8:29 PM · gnupg (gpg22), S/MIME, Bug Report

Dec 4 2019

werner closed T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets) as Resolved.

Fixed for 2.2.19 and master

Dec 4 2019, 4:28 PM · gnupg (gpg22), wkd, Bug Report

Dec 3 2019

werner added a comment to T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.

Thank you.

Dec 3 2019, 3:00 PM · gnupg (gpg22), S/MIME, Bug Report
destogl added a comment to T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.

I uploaded the certificate files. For a test please do the following:

Dec 3 2019, 2:31 PM · gnupg (gpg22), S/MIME, Bug Report
destogl changed the visibility for T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.
Dec 3 2019, 2:28 PM · gnupg (gpg22), S/MIME, Bug Report

Nov 29 2019

werner reopened T4684: Release GnuPG 2.2.18 as "Open".

There is a regression in decryption with hidden recipients; see T4762.
Patch available

.

Nov 29 2019, 5:01 PM · Release Info, gnupg (gpg22)

Nov 27 2019

werner added a comment to T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.

Sorry, a fix didn't made it into 2.2.18.

Nov 27 2019, 8:19 AM · gnupg (gpg22), S/MIME, Bug Report

Nov 26 2019

werner set External Link to https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html on T4684: Release GnuPG 2.2.18.
Nov 26 2019, 7:26 AM · Release Info, gnupg (gpg22)

Nov 25 2019

werner closed T4594: dirmngr appears to unilaterally import system CAs as Resolved.
Nov 25 2019, 10:16 PM · Bug Report, dirmngr, gnupg (gpg22)
werner closed T4627: "gpg --verbose --list-secret-keys" prints a lot of warning messages unrelated to secret keys as Resolved.
Nov 25 2019, 10:15 PM · gnupg (gpg22), Bug Report
werner closed T4634: "gpg --quiet --quick-gen-key" is not quiet: emits "key $FPR marked as ultimately trusted" to stderr. as Resolved.
Nov 25 2019, 10:15 PM · gnupg (gpg22), Bug Report
werner closed T4628: new import-clean default for keys from keyservers modifies the local keyring when anything is returned as Resolved.
Nov 25 2019, 10:15 PM · Keyserver, gnupg (gpg22), Bug Report
werner updated the task description for T4684: Release GnuPG 2.2.18.
Nov 25 2019, 10:14 PM · Release Info, gnupg (gpg22)
werner updated the task description for T4684: Release GnuPG 2.2.18.
Nov 25 2019, 10:14 PM · Release Info, gnupg (gpg22)
werner closed T4665: gpg --delete-key of subkey leaves dangling subkey binding signature as Resolved.
Nov 25 2019, 10:13 PM · gnupg (gpg22), Bug Report
werner closed T4662: --locate-external-keys does not interact well with --no-auto-key-locate as Resolved.
Nov 25 2019, 10:12 PM · gnupg (gpg22), Bug Report
werner closed T4633: gpg argument "--passphrase=" yields 'missing argument for option "--passphrase="' as Resolved.
Nov 25 2019, 10:12 PM · Restricted Project, gnupg (gpg22), Bug Report
werner closed T4644: gpg: implement keybox compression run as Resolved.
Nov 25 2019, 10:12 PM · gnupg (gpg22), Bug Report
werner closed T4684: Release GnuPG 2.2.18 as Resolved.
Nov 25 2019, 10:11 PM · Release Info, gnupg (gpg22)